diff options
author | Iru Cai <mytbk920423@gmail.com> | 2019-05-17 06:41:48 +0800 |
---|---|---|
committer | Iru Cai <mytbk920423@gmail.com> | 2019-05-17 06:41:48 +0800 |
commit | b760658a92b9a237c65416aeafb07eadd361dca6 (patch) | |
tree | 8305c639549adfc1f09b3129280371075c47353d /chap/chap2.tex | |
parent | ef4c51dacfead0c3509c68cd562866a8bf82f88d (diff) | |
download | dissertation-b760658a92b9a237c65416aeafb07eadd361dca6.tar.xz |
upd
Diffstat (limited to 'chap/chap2.tex')
-rw-r--r-- | chap/chap2.tex | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/chap/chap2.tex b/chap/chap2.tex index 17f99c1..86ab846 100644 --- a/chap/chap2.tex +++ b/chap/chap2.tex @@ -615,13 +615,13 @@ ARM 处理器上进行验证,确认它们受 Spectre v1 的影响。 如图\ref{lst:spec-buf-overflow}中的程序: \begin{figure} - \centering - \caption{推测式缓冲区溢出} - \label{lst:spec-buf-overflow} \begin{minted}{C} if (x < len) a[x] = z; \end{minted} + \centering + \caption{推测式缓冲区溢出} + \label{lst:spec-buf-overflow} \end{figure} 攻击者给出一个超过数组 \verb|a| 大小的 \verb|x| 时,在推测式执行时,会 |